CVE-2022-45636

8.1 HIGH

📋 TL;DR

This vulnerability allows attackers to unlock MEGAFEIS and BOFEI DBD+ smart locks without authorization by sending arbitrary API requests to the mobile application. It affects users of the MEGAFEIS/BOFEI DBD+ mobile apps for iOS and Android. The flaw stems from an insecure authorization scheme in the API implementation.

💻 Affected Systems

Products:
  • MEGAFEIS DBD+ Mobile Application
  • BOFEI DBD+ Mobile Application
Versions: v1.4.4 and likely earlier versions
Operating Systems: iOS, Android
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the mobile application's API communication layer. Both iOS and Android versions are affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could unlock any vulnerable smart lock remotely, potentially enabling physical theft, unauthorized access to secured areas, or safety hazards.

🟠

Likely Case

Attackers with network access to the mobile app's API endpoints could unlock specific smart locks without proper authentication.

🟢

If Mitigated

With proper API authorization controls, only authenticated users with appropriate permissions could unlock devices.

🌐 Internet-Facing: HIGH - The mobile app communicates with cloud APIs that are internet-accessible, making remote exploitation possible.
🏢 Internal Only: LOW - The primary attack vector is through internet-facing APIs, though local network attacks might be possible if the app uses local communication.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The WithSecure Labs disclosure includes technical details that could be used to create exploit tools. The attack requires understanding of the API structure but doesn't need advanced technical skills.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: No vendor advisory found in provided references

Restart Required: No

Instructions:

1. Check for app updates in Apple App Store or Google Play Store. 2. Update to the latest version if available. 3. Contact MEGAFEIS/BOFEI support for patch information.

🔧 Temporary Workarounds

Disable Remote Access

all

Temporarily disable the mobile app's ability to unlock devices remotely

Network Segmentation

all

Restrict network access to the mobile app's API endpoints

🧯 If You Can't Patch

  • Discontinue use of the vulnerable mobile application for unlocking devices
  • Implement physical security controls as backup for affected smart locks

🔍 How to Verify

Check if Vulnerable:

Check if you're using MEGAFEIS/BOFEI DBD+ mobile app version 1.4.4 or earlier. Review app permissions and API communication patterns.

Check Version:

Check app version in mobile device settings: iOS Settings > General > iPhone Storage > [App Name]; Android Settings > Apps > [App Name] > App Info

Verify Fix Applied:

Verify app version is updated beyond v1.4.4. Test unlocking functionality with proper authentication requirements.

📡 Detection & Monitoring

Log Indicators:

  • Unusual API requests to lock/unlock endpoints
  • Failed authentication attempts followed by successful unlocks
  • API requests without proper authorization headers

Network Indicators:

  • Unencrypted or weakly authenticated API calls to smart lock services
  • Traffic to known vulnerable API endpoints

SIEM Query:

source="mobile_app_logs" AND (event="unlock" OR event="lock") AND auth_status="failed" AND result="success"

🔗 References

📤 Share & Export